Home
last modified time | relevance | path

Searched refs:identities (Results 1 – 18 of 18) sorted by relevance

/src/crypto/krb5/src/lib/krb5/krb/
H A Dpreauth_pkinit.c42 krb5_responder_pkinit_identity **identities; member
63 for (i = 0; data->identities[i] != NULL; i++) in get_one_challenge()
66 data->identities[i] = k5alloc(sizeof(*data->identities[i]), &data->err); in get_one_challenge()
67 if (data->identities[i] == NULL) in get_one_challenge()
69 data->identities[i]->identity = strdup(key); in get_one_challenge()
70 if (data->identities[i]->identity == NULL) { in get_one_challenge()
74 data->identities[i]->token_flags = token_flags; in get_one_challenge()
106 chl->identities = k5calloc(n_ids + 1, sizeof(chl->identities[0]), &ret); in krb5_responder_pkinit_get_challenge()
107 if (chl->identities == NULL) in krb5_responder_pkinit_get_challenge()
112 get_one_challenge_data.identities = chl->identities; in krb5_responder_pkinit_get_challenge()
[all …]
/src/crypto/krb5/src/plugins/preauth/pkinit/
H A Dpkinit_identity.c684 pkinit_set_deferred_id(pkinit_deferred_id **identities, in pkinit_set_deferred_id() argument
693 ids = *identities; in pkinit_set_deferred_id()
711 *identities = out; in pkinit_set_deferred_id()
747 pkinit_find_deferred_id(pkinit_deferred_id *identities, in pkinit_find_deferred_id() argument
752 for (i = 0; identities != NULL && identities[i] != NULL; i++) { in pkinit_find_deferred_id()
753 if (strcmp(identities[i]->identity, identity) == 0) in pkinit_find_deferred_id()
754 return identities[i]->password; in pkinit_find_deferred_id()
764 pkinit_get_deferred_id_flags(pkinit_deferred_id *identities, in pkinit_get_deferred_id_flags() argument
769 for (i = 0; identities != NULL && identities[i] != NULL; i++) { in pkinit_get_deferred_id_flags()
770 if (strcmp(identities[i]->identity, identity) == 0) in pkinit_get_deferred_id_flags()
[all …]
H A Dpkinit.h319 (pkinit_deferred_id **identities, const char *identity,
322 (pkinit_deferred_id *identities, const char *identity);
324 (pkinit_deferred_id *identities, const char *identity);
325 void pkinit_free_deferred_ids(pkinit_deferred_id *identities);
/src/crypto/openssl/doc/man3/
H A DOSSL_DISPATCH.pod43 Available function identities and corresponding function signatures are
45 Furthermore, the chosen function identities and associated function
H A DOSSL_ALGORITHM.pod39 This string is a colon separated set of names / identities, and is used by
43 Multiple names / identities allow a specific algorithm implementation to be
45 known identities:
H A DX509_get_subject_name.pod77 can be set. For details on setting X509_ACERT holder identities, see
H A DSSL_set_quic_tls_cbs.pod118 established. The I<prot_level> argument identities the TLS protection level and
/src/contrib/wpa/hostapd/
H A Dhostapd.eap_user33 # method is using known prefix in identities (e.g., EAP-SIM and EAP-AKA). This
34 # is only allowed for phase 1 identities.
82 # Wildcard for all other identities
/src/usr.bin/ssh-copy-id/
H A Dssh-copy-id.sh56 keys="$(ssh-add -L | grep -v 'The agent has no identities.')$nl$keys"
/src/crypto/openssl/doc/internal/man3/
H A DOSSL_METHOD_STORE.pod51 Numeric identities are expected to be an algorithm identity for the methods.
53 these numeric identities accordingly.
/src/crypto/openssl/ssl/statem/
H A Dextensions_srvr.c1309 PACKET identities, binders, binder; in tls_parse_ctos_psk() local
1327 if (!PACKET_get_length_prefixed_2(pkt, &identities)) { in tls_parse_ctos_psk()
1333 for (id = 0; PACKET_remaining(&identities) != 0; id++) { in tls_parse_ctos_psk()
1338 if (!PACKET_get_length_prefixed_2(&identities, &identity) in tls_parse_ctos_psk()
1339 || !PACKET_get_net_4(&identities, &ticket_agel)) { in tls_parse_ctos_psk()
/src/crypto/krb5/src/windows/installer/wix/
H A Dmsi-deployment-guide.txt528 Specifies the Default AllowAutoRenew value for new identities.
535 If '0', new identities will not be pinned to the display by default.
536 If '1', new identities will be pinned to the display by default.
685 Determines if addressless tickets will be obtained for new identities.
/src/crypto/openssh/
H A DPROTOCOL.agent72 identities and, in particular, signature requests will check the key
/src/crypto/openssl/
H A DNEWS.md558 IDENTIFIER sub-identities. ([CVE-2023-2650])
H A DCHANGES.md15597 specific names (called "system identities"). In the C code, these
/src/contrib/llvm-project/llvm/lib/Target/ARM/
H A DARMInstrInfo.td4810 // Alternate cases for PKHBT where identities eliminate some nodes.
4827 // Alternate cases for PKHTB where identities eliminate some nodes. Note that
H A DARMInstrThumb2.td3389 // Alternate cases for PKHBT where identities eliminate some nodes.
3418 // Alternate cases for PKHTB where identities eliminate some nodes. Note that
/src/crypto/krb5/src/include/krb5/
H A Dkrb5.hin6785 krb5_responder_pkinit_identity **identities;